crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738
 
 

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

SMiShing: A New Mobile Computing Scam

Chances are, you’ve heard of phishing before--emails that promise some benefit or prize if you only click on the included link, that actually only results in trouble for you and your data. Unfortunately, as technology has embraced mobility, so have phishing attempts. This is why you must also be aware of SMiShing scams.

What Is SMiShing?
SMiShing is a mobile variant of phishing that involves the use of a text message, rather than an email, to catch the target in the phisher’s net. These attacks are highly reliant on the target’s compliance with the instructions the cybercriminal provides, as well.

These attacks can be more effective than the typical phishing attack, as the general public is increasingly aware of cyber threats--yet don’t expect these threats to manifest in their cell phone.

Just as one would experience in the ‘typical’ phishing attack, a ‘smisher’ will likely try to gain your trust in order to extract credentials. This ultimately allows them access to the accounts they obtained the credentials for, permitting them to wreak havoc and/or steal what they please. This is especially dangerous if they gain access to any client financial information you may have on file. Alternatively, some smishers will claim that if you don’t access a link and enter your personal information, that you will be charged daily for some service. Naturally, if this service is one that your organization has not signed up for, this message should be reported to IT and then disregarded.

How To Spot SMiShing Scams
First, if you suspect that a message is fraudulent, it never hurts to reach out to confirm that the message was sent by who it seems to have been. To do so, reach out via a different channel than your text, such as calling an official service number to speak directly to a representative. This allows you to confirm that the message was legitimate or fraudulent without exposing yourself or the business to greater risk.

In essence, avoid responding to text messages from senders that you don’t know--especially when the number is a 5000 number. This indicates that the message was actually an email sent as a text message, which is often a tactic used by scammers.

Finally, keep an eye out for any messages that contain downloadable apps. These are a favorite method to introduce malware to a mobile device. If an app doesn’t come from an official app store, it is likely a piece of disguised malware.

How To Be The Most Safe
If in doubt, confirm before you answer. Additionally, a VPN (or virtual private network) can help you maintain your mobile security, especially when paired with the practices outlined above.

Integrated Business Technologies can help you to put these safeguards, and others, in place for your business devices. Give us a call at (918) 770-8738 to get started.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 20 June 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Technology Tip of the Week Privacy Managed Service Provider Business Management Cloud Internet Microsoft Saving Money Business Computing Productivity Best Practices Workplace Tips IT Services Hosted Solutions Backup Hackers Email Mobile Devices Malware Software IT Support Business Small Business Hardware Network Data Communication Server Smartphones Upgrade Business Continuity VoIP Windows Mobile Device Management Disaster Recovery Google Virtualization Computer Efficiency Microsoft Office Miscellaneous Innovation Mobile Office Vendor Management Holiday Gadgets Social Media Outsourced IT Mobile Computing BYOD Android Smartphone User Tips Quick Tips Passwords Browser Network Security WiFi Data Backup Windows 10 Remote Monitoring Ransomware Bring Your Own Device Spam Best Practice Internet of Things The Internet of Things Managed IT services Trending Wireless Technology Operating System Apple Tech Term Remote Computing Alert Users Data Management Content Filtering Data Recovery Going Green Artificial Intelligence History Gmail Firewall Save Money IT Consultant Encryption Printer Tech Support Current Events Information Technology Managed IT Big Data App Office Analytics Customer Relationship Management IT Solutions Unified Threat Management Lithium-ion Battery Windows 8 Cloud Computing Router Antivirus Document Management Humor Applications Saving Time Paperless Office Avoiding Downtime Employer-Employee Relationship Maintenance Hard Drives Facebook Compliance Marketing Automation Excel Office Tips Retail Phishing IT service Mobile Device Digital Payment Chrome Business Growth VPN Apps Risk Management Application Managed IT Services Virus Website Customer Service Hacking Computers Fax Server Phone System Outlook Health Collaboration Cybersecurity Two-factor Authentication Budget Data Security Computer Repair Proactive IT Regulations Recovery Inbound Marketing Mouse Money Bandwidth Running Cable Social Net Neutrality Licensing Infrastructure PowerPoint Social Networking Wi-Fi Unified Communications Training Tablet Office 365 iPhone User Error Password Government Project Management Co-Managed IT Administration Augmented Reality Presentation Mobility Business Owner Sports Hacker User Point of Sale Programming Tip of the week Scam Twitter Company Culture Analyitcs Education Safety Specifications Hosted Solution IBM Settings Flexibility Cost Management Wireless Data storage Cybercrime File Sharing Save Time Wearable Technology Robot Hiring/Firing Vulnerability Productivity Printing Display Alerts End of Support LiFi HIPAA Computing Statistics Data loss Help Desk Redundancy Intranet Competition Business Intelligence Network Congestion Recycling eWaste Downtime Internet Exlporer Smart Technology Search Mobile Security Files Virtual Desktop USB Piracy Samsung IoT Distributed Denial of Service Legal Online Currency Troubleshooting Debate Windows 10 Hotspot Experience Machine Learning Multi-Factor Security Heating/Cooling Alt Codes Computer Accessories Chatbots Crowdfunding Star Wars Managed IT Service Consumers YouTube Language Private Cloud Google Calendar Typing Techology Identity Utility Computing Scheduling Software Tips Break Fix IP Address Google Drive Server Management Computing Infrastructure How To Public Cloud Legislation Refrigeration Cryptocurrency Disaster Touchscreen Disaster Resistance Healthcare Dark Web Google Docs Cooperation Sync Bitcoin Digital Signature IT Consulting Motherboard Memory Hard Drive Data Warehousing communications Patch Management Staff Laptop Mobile Device Managment Software as a Service Hacks Modem Conferencing Cache IT Support Microsoft Excel Documents Entrepreneur Operations Halloween Data Breach Cookies Macro PC Care Technology Tips Undo Value People Management Blockchain 5G PDF Technology Laws eBay Virtual Private Network Scary Stories Virtual Reality Nanotechnology Leadership Travel Comparison Remote Support Streaming Media Enterprise Resource Planning New Additions Permissions Monitors Skype SaaS Unified Threat Management Deep Learning Print Server Gaming Console Text Messaging IT Technicians Screen Reader BDR Black Friday Domains Google Wallet Work Station LinkedIn Mobile Congratulations Assessment Fraud Fun Writing Access Control Word Law Firm IT Video Surveillance Mirgation Smart Tech Identity Theft Cyber Monday Public Speaking Drones Windows 8.1 Update Best Available Buisness Managing Stress IT Management Cortana Social Engineering Telephony SharePoint Identities Business Technology Storage Connectivity Backups Environment CIO Enterprise Content Management Adminstration Network Management Knowledge Downloads Solid State Drive Bluetooth 3D Networking Migration

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...
      QR-Code